Index for The Computer Journal, Volume 34
1. Index of titles of Papers, etc
A Controlled Environment for Meta-Message Processing 331
A DAP FORTRAN Subroutine for Thinning Digitised Pictures
377
A Framework for Building Dependable Systems 173
A Longest Path Algorithm to Display Decision Tables 358
A Mergeable Double-ended Priority Queue 423
A Model for the Stability Analysis of Maintenance Strategies for
Linear List 80
A Modification of Sale’s Algorithm to Accommodate FORTRAN
77 (373
A Neural Network Simulating System 92
A New Technique for Self-Organising Linear Searches 450
A Note on the Efficiency of an Interval Routing Algorithm 475
A Parallel Prolog Abstract Machine and its Multi-Transputer
Implementation 52
A Query Language for Retrieving Information from Hierarchic Text
Structures 254
A Structured Semantic Design of Distributed Operating Systems
482
A Survey of Exploratory Software Development 153
A Survey on Binary Tree Codings 438
Adaptive Deadlock-free Packet Routing in Transputer-based Multi-
processor Interconnection Networks 493
Additional papers 571
An Adaptive Overflow Technique to Defer Splitting in B-trees 397
An Efficient Starvation-Free Semaphore Solution for the Graphical
Mutual Exclusion Problem 345
An Examination of Requirements Specification Languages 143
An Introduction to Knuth—Bendix Completion 2
Announcements 87, 91, 94, 121, 142, 152, 163, 181, 185, 238, 244,
271, 286, 344, 349, 381, 414, 437, 454, 468, 476, 477, 492, 541,
550, 558, 565
Autodescriptivity: beware! 380
Book Reviews 15, 41, 187, 188, 194, 301, 319, 357, 396, 422, 474,
S25, 533,513
Comparative Performance of Overlapping Connectivity Multi-
processor Interconnection Networks 207
Concurrent Object-Oriented Programming in Lisp 311
Constraint Maintenance as a Data Model Design Criterion 73
Constructive Rewriting 34
Correspondence 72, 206, 264, 310, 405, 427, 502, 513
Default Databases and Incomplete Information 239
Design Approaches: A Comparative Study of Information System
Design and Architectural Design 215
Development Methods for Real-Time Systems 164
Editorial 1, 97, 193, 289, 385, 481
Efficient Dissemination of Information in Computer Networks 534
Efficient Generation of Rotational-Admissible Codewords for
Binary Trees 379
Efficient Two-Dimensional Fast Fourier Transform Subroutines for
Real-Valued or Hermitian data 362
Empirical Study of the Expected Running Time of Shellsort 88
Fault-tolerant Reference Counting for Garbage Collection in
Distributed Systems 503
Finding a Majority When Sorting is Not Available 186
HIDEL: A Language for Hierarchical VLSI Design 195
High Storage Utilisation for Single-Probe Retrieval Linear Hashing
455
Implementation of Flexible Arrays Using Balanced Trees 386
Implementation of Karp—Luby Monte Carlo Method: An Exercise
in Approximate Counting 279
Implementations of Term Rewriting Systems 20
Improved Partial-Match Search Algorithms for BD Trees 415
Improved Recursion Handling through Integrity Constraints 282
Information Systems Design Methodologies — Book Reviews 182
Information Systems Development Research: An Exploration of
Ideas in Practice 98
‘Innovation for Failure’ - Some Reflections on the Work of the
NRDC Relevant to the Early History of the Computer Industry
in the UK 272
Integrating Human-Computer Interaction with Jackson System
Development 132
I-Pigs: an Interactive Graphical Environment for Concurrent
Programming 320
Linear Probing Sort 370
Logic Programming for Software Verification and Testing 350
Manipulating Full-text Scientific Databases: A Logic-based
Semantico-pragmatic Approach 245
Methodologies from Machine Learning in Data Analysis and
Software 559
Mu-balancing M-way Search Trees 406
Multimedia Information Systems —- The Management and Semantic
Retrieval of all Electronic Data Types 225
Notices 188
On the Design of a Machine-Independent Perfect Hashing Scheme
469
Order-sorted Term Rewriting 16
Ord-Smith’s Pseudo-Lexicographical Permutation Procedure is the
Tompkins—Paige Algorithm 569
Performance of Priority Queue Structures in a Virtual Memory
Environment 428
Practical Concurrent Programming for Parallel Machines 302
Prolog in Practical Compiler Writing 64
Reduction and Narrowing for Horn Clause Theories 42
Representing Business Policies in the Jackson System Development
Method 122
Seven Ways to Develop Office Systems: A Managerial Comparison
of Office System Development Methodologies 113
Structure Clashes 566
The Coordinatation of Distributed Active Messages in a Dynamic
Network Topology 542
The Design of a System for Distributing Shared Objects 514
The HDG-Machine: a Highly Distributed Graph-Reducer for a
Transputer Network 290
Threshold Values for Processing Distributed Queries 551
Unity Doesn’t Imply Unification or Overcoming Heterogeneity
Problems in Distributed Software Engineering Environments
522
Weighting Without Waiting: the Weighted Path Length Tree 444
When does a Mouse become a Rat? or ... Comparing Performance
and Preferences in Direct Manipulation and Command Line
Environment 265
Wilkes Award 112
2. Index of Authors and Other Contributors
Agrawal, D. and Malpani, A. 534
Akman, V. 279
Ancona, M., Clematis, A., De Floriani, L. and Puppo, E. 195
Argo, G. 444
Avison, D. E. and Wood-Harper, A. T. 98
Bastani, F. B., Chen, I.-R. and Hilal, W. 80
Bodorik, P. and Riordon, J. S. 55i
Bradford, R. see Padget, J.
Brink, C., Rewitzky, I. M. and Schmidt, R. A. 380
Burn, G. L. see Kingdon, H.
Burns, A. and Lister, A. M. 173
Campbell, D. and McNeill, T. 186
Challab, D. J. 386
Chang, C. C., Chen, C. Y. and Jan, J. K. 469
Chen, C. Y. see Chang, C.C. .
Chen, I.-R. see Bastani, F. B.
Cheng, S.-T. see Wu, J.-L.
Clematis, A. see Ancona, M.
Clint, M. see Stewart, A.
THE COMPUTER JOURNAL, VOL. 34, 1991
|
Dandamudi, S. P. and Sorenson, P.G. 415 Shahid, A. A. see Yannakoudakis, E. J.
Daskalakis, C. N. see O’Docherty, M. H. Shrivastava, S. K. see Mancini, L.
Daszczuk, W. B. 482 Skillicorn, D. B. 302
De Floriani, L. see Ancona, M. Slape, J. K. and Wallis, P. J. L. 373
Dick, A. J.J. 2 Small, C. see King. P.
Dick, A. J. J. and Watson, P. 16 Smyth, W. F. 406
Dobosiewicz, W. 370 Son, N. T. and Paker, Y. 493
Dollimore, J., Miranda, E. and Xu, Wang 514 Sorenson, P. G. see Dandamudi, S. P.
Srinivasen, B. 397
Fenwick, P.M. 450 Stewart, A., Holt, C., Clint, M. and Perrott, R. 377
Fitch, J. see Padget, J. Sutcliffe, A. G. and Wang, I. 132
Geesink, L.H. 542 Thanisch, P. F. see Wicovsky, K.
Gibbs, S. see Morgan, K. Tharp, A. L. see Ou, S. F.
Trenouth, J. 153
Hagan, B. J. see Hull, M. E. C. Tse, T. H. and Pong, L. 143
Halsbury, The Rt. Hon. the Earl of 272 E
Hammersley, A. P. 362
Hammersley, P. 182 Verrall, M. 5
eet and Kirchner, H. 20 Wallis, P. J. L. see Slape, J. K.
Holt. C ko Siveant A M4 Wang, I. see Sutcliffe, A. G.
. Watson, P. see Dick, A. J. J.
Hull, M. E. C., O'Donoghue, P. G. and Hagan, B. J. 164 Weiss, M.A. 88
Wen, Z. see Olariu, S.
Jacob, R.T., see Yue, K Wicovsky, K., Thanisch, P. F. and Williams, M. H. 282
Jan, J. K. see Chang, C. C. Wilkinson, B. 207
Williams, M. H. see Wicovsky, K
en | Wood-Harper, A. T. see Avison, D. E.
King, P. and Small, C. 239 Wu, J.-L. and Cheng, S.-T. 92
Kingdon, H., Lester, D. R. and Burn, G. L. 290
Kirchner, C. see Hermann, M.
Kirchner, H. see Hermann, M. Yannakoudakis, E. J. and Shahid, A. A. 331
Yue, K. and Jacob, R. T. 345
Lahodynskyj, L.A. 566
Lester, D. R. see Kingdon, H
Lister, A. M. see Burns, A. 3. Index of Topics, etc
Abstract parallel machine 290
Macleod, I. A. 254 Abstraction 164
Makinen, E. 379, 438 Access methods 397
Malbani, A see Agrawal, D. Action research 98
Mancini, L. and Shrivastava, S. K. 503 Action systems 302
Marshall, R. 245 Active messages 542
Martel, C. U. see Naor, D. Adaptive reorganisation 397
Matloff, N.S. see Naor, D. Algorithms 406, 415, 444
McNeill, T. see Campbell, D. Application architecture 514
Michie, D. 559 Application software 522
Miranda, E. see Dollimore, J. Architectural design 215
Morgan, K., Morris, R. L. and Gibbs, S. 265 Architecture independent propramming languages 302
Morris, R. L. see Morgan, K. Architectures 173
Artificial intelligence 52
Naor, D., Martel, C. U. and Matloff, N.S. 428 Artificial intelligence programming 153
Nipkow, T. 34 Attribute grammars 64
Noble, F. 113 Augmented data manipulator network 207
Autodescriptivity 380
Xu, Wang see Dollimore, J.
O’Docherty, M. H. and Daskalakis, C. N. 225
O’Donoghue, P. G. see Hull, M. E. C. Ballot sequence 438
Olariu, S., Overstreet, C. M. and Wen, Z. 423 Bandwidth 207
Olerup, A. 215 Baseline network 207
Orman, L. 73 BD tree 415
Ou, S. F. and Tharp, A. L. 455 Binary search trees 444
Overstreet, C.M. see Olariu, S. Binary trees 379, 438
Book reviews 182
Paakki, J. 64 Boolean formulas 279
Padawitz, P. 42 B-trees 386, 397, 406, 428
Padget, J., Bradford, R. and Fitch, J. 311 Business policy 122
Paker, Y. see Son, N. T.
Perrott, R. see Stewart, A. CASE 182
Pong, L. see Tse, T. H. Cellular automation 52
Pong, M-C. 320 Client-server model 80
Poo, C.-C. D. 122 Closed world assumption 239
Puppo, E. see Ancona, M. Code generation 64
Codeword 379
Rewitzky, I. M. see Brink, C. Compiler construction 64
Riordon, J. S. see Bodorik, P. Completion 20
Rohl, J.S. 569 Computational complexity 475
Ruzicka, P. 475 Computer hardware description languages 195
Computer networks 534, 542
Schmidt, R. A. see Brink, C. Concurrent maintenance 80
(vi) THE COMPUTER JOURNAL, VOL. 34, 1991
|
i
4
L
|
i
|
Te
|
Concurrent programming 302, 311, 320, 345
Conditional reduction 42
Consistent sharing of objects 514
Constraint maintenance 73
Constructive rewriting 34, 42
Content retrieval 225
Content scanning 245
Contingency 98
Coordination Model 542
Cooperating processes 331
Correcting query processing strategies 551
Counting 279
Critical success factors 113
Crossbar switch network 207
CSCW application platform 514
CSP 302
DAP FORTRAN 377
Data flow computing 52
Data model design 73
Data models 225
Data structure maintenance policy 80
Data structures 195, 397, 423, 428, 444
Database constraints 73
Databases 282, 397, 415
Dataflow 302
Deadlock 207, 331, 345, 493
Deap 423
Decision rules 559
Decision tables 358
Decision-to-decision graph 350
Deductive databases 239
Definite clause grammar 64
Degradable systems 80
Delta networks 207
Dependability 173
Design 215
Design and analysis of algorithms 475
Design criteria 73
Design procedure 73
Design process 215
Dialogue design 132
Digitised pictures 377
Directed acyclic graph 282
Disjunctive normal form 279
Display design 132
Distributed active messages 542
Distributed algorithms 475
Distributed computer networks 475
Distributed databases 551
Distributed hardware 482
Distributed objects 514
Distributed systems 80, 503, 522, 534, 542
Distribution 173, 290, 311
Dynamic (adaptive) query processing 551
Dynamic networks 542
Dynamic state information 331
Dynamic storage allocation 386
EDDA 143
Electronic mail 542
Equational reasoning 2, 16, 20
Equational theories 2, 16
Equivalence class 186
Event list 428
Experimental evaluation 265
Experimental measurements 428
Expert systems 245
Exploratory programming 153
Fast Fourier transform 362
Fault-tolerance 503, 534
File organisation 397
File structures 415
Flexible arrays 386
Fluid approximation model 80
Formula rewriting 34
FORTRAN 77 373
Fragmentation 386
Full-text databases 245
Functional simulation 195
Gamma networks 207
Garbage collection 503
Garbage collection algorithms 80
Goal 215
Goal reduction 42
Graphical interface 320
Graphical languages 320
Graphs 195, 215
Hashing 455, 469
HCI methods 132
Heap 423, 428
Heapsort 88
Height-balancing 406
Heterogeneity 522
Hierarchical models 195
HOOD 164
Hopfield net 92
Horn clauses 42
HOS 143
Human activity systems 98
Human computer interaction 132, 265
Human computer interface 98
Human interface preferences 265
Hypercube 493
Hypermedia 225
Hypertext 245
ICL DAP 377
Image databases 225
Implementation 113
Incomplete information 239
Index sequential access 397
Index sequential files 406
Indexing 397
Information analysis 132
Information extraction 331
Information modelling 98
Information processing 331
Information retrieval 254
Information systems 98, 122, 225
Information systems design 215
Information systems development methodologies 113
Information transferring 331
Insertion costs 455
Integrity constraint 282
Intelligent mail 542
Interacting defaults 239
Interactive graphics 320
Interconnection networks 482, 493
Interface design 265
Inter-process communication 331
IPSC 52
Isabelle 34
JSD 122, 132, 164
JSP 164, 566
Kernel 482
Keywords 469
Knowledge databases 225
Knowledge-base systems 245
Knuth-Bendix completion 2
Kohonen map 92
K-d tree 415
Letter-oriented keys 469
Level-by-level order 438
Level sequences 438
Linda 302
Linear hashing +55
Linear probing sort 370
Linear search 450
Lisp 311
Location and access transparency 514
Logic of partial functions 380
THE COMPUTER JOURNAL, VOL. 34, 1991
Logic programming 20, 52, 64, 350 Priority queues 423, 428
Long term reliable storage of objects 514 Privacy and protection of information 514
Lower bounds in computational complexities 475 Process management 331
L-sequences 438 Process synchronisation 164
Program inversion 566
Maintenance cost 73 Program transformation 569
Management of change 113 Program understanding 331
Manual design 73 Program verification 42
Many-sorted rewriting 16 Programming environments 153
Many-valued logic 380 Prolog
Markup languages 254 Prolog-based systems 245
Mascot 3 164 Propagation protocols 534
Matrices 215 Propositional logic 380
Memory management 386, 455 Protocol management 331
MERISE 182 Protocols 475
Message processing 331 Prototyping 98
Messages and meta-messages 331 Proxies 514
Method integration 132 P-sequences 438
Methodologies 98, 122, 164, 182 Pseudo-Lexicographical permuation generation 569
Miranda 290 PSL 143
Misfit 215
ML 34 Query languages 254
Modal logic 245 Query optimisation 551
Modelling 164 Queueing systems 80
Monte Carlo algorithm 279 Quicksort 88
Mulfiprefix 302
Multidimensional data structures 415 Real-time 164, 173
Multikey searching 415 Recursion 282
Multimedia 225, 245 Reference counting 503
Multimedia databases 225, 245 Reliability 503
Multi-processor interconnection networks 207 Remote procedure calls 503
Multi-processor systems 482, 493 Replicas of shared objects in users workstations 514
Multistage interconnection networks 207 Replicated data 534
Multivariate data analysis 559 Requirements definition 215
Multiview 98 Requirements specification 143, 164
Mutual exclusion problems 345 Reversal 569
M-way trees 406 Rewrite rules 2
Rhombic crossbar switch networks 207
NAG 362 Rich picture 98
Narrowing 42 Rotation 379, 569
Natural language processing 245 Routing 493
Negation as failure 239 - Routing problems 475
Neural description language 92 RSL 143
Neural networks 92 Rule-structured classification 559
NRDC 272
SADT 143
Object-based systems 503 Safe defaults 239
Object-oriented databases 225 Safety critical 173
Object-oriented design 164 Sale’s algorithm 373
Object-oriented programming 225, 311 SAMM_ 143
OCCAM _ 52, 302 Scan 302
Office information systems 113 Scanning 64
Open world assumption 239 Scientific data bases 245
Operating systems 345, 469, 482 Search trees 406
Optimal rewriting 20 Searching 450
Order-sorted rewriting 16 Secondary clustering 455
Organisation design 113 Self-adjusting data structures 444
Orphan detection 503 Self-organizing search 450
Overflow technique 397 Semantic analysis 64
Overhead 551 Semantic nets 225
Overlapping connectivity networks 207 Semantics and pragmatics 245
Semaphores 345
Page faults 428 Sequential lists 450
Parallel machine interface 302 SGML 254
Parallel processing 52 Shared model 514
Parallel programming 345 Shared objects 514
Parallelism 164, 290 Shellsort 88
Parsing 64, 373 Sigma networks 207
Partial-match queries 415 SIMD 52
Participation 98 SIMD computation 377
Pascal 406 SIMD implementation 377
Path predicate 350 Simulation 428
#P-complete 279 Single-probe retrieval 455
Performance 415 Single-sorted rewriting 16
Performance evaluation 80, 551 Socio-technical approach 98, 113, 122, 182
Periodic maintenance 80 Soft systems 98, 113
Permutation pairs 438 Software engineering 522, 559
Permutations 569 Software factory 522
PRAM 302 Software methodologies 153
(viii) THE COMPUTER JOURNAL, VOL. 34, 1991
|
. |
L
-
§
g
q
i
1 |
. |
q
|
|
4
* |
]
j
|
i
4
Software tools 153
Software verification 350
Sorting 186, 370
Sorting algorithm 88
Specification languages 143
Splay trees 428
SSADM _ 182
Stability analysis 80
Starvation 345
Static processing 551
Stochastic processes 80
Storage structures 397
Strategic applications 113
Strategy 113
Strategy execution phases 551
Structural description 195
Structure clashes 566
Structured methods 132
Structured programming 566
Structured system design 164
Subsumption 2
Superposition 2
Symbolic evaluation 350
Synchronisation 534
Systems analysis 132
Systems approach 98
Systems evolution 122
Task analysis 132
Techniques 98
Term complexity 2
Term reduction 42
Term rewriting 2, 16, 20, 34, 42
Termination 20
Text retrieval 254
Theorem proving 20, 34, 42
Thinning algorithms 377
Timing analysis 132
Tools 98
Total order 186
Transparent remote method invocation 514
Transputer 52, 290
Tree permutations 438
U-list 282
Unification confluence 2
Unitary thickness skeletons 377
UNITY 302
User interfaces for shared information 514
User modelling 245
VDM 380
Viewpoint 350
Virtual memory 428
VLSI CAD 195
Weight sequences 438
Weighted path length 444
Worst-case analysis 475
Zak’s sequences 438
THE COMPUTER JOURNAL, VOL. 34, 1991
(ix)